Perbandingan Keacakan Citra Enkripsi Algoritma AES dan Camelia Uji NPCR dan UACI
DOI:
https://doi.org/10.30865/jurikom.v8i6.3624Keywords:
AES, Camellia, Cryptography, NPCR, UACIAbstract
The need for data security arises because of the many threats made by outside parties to retrieve data and use it for personal interests. Security for medical images is carried out because medical images store patient health information data that is confidential. In this study, the image data used specifically uses radiological medical images. There are many techniques and algorithms that can be used to secure image data. This study uses the AES and Camellia algorithms which in their application use several different operating modes. To measure the quality of the encrypted image, the randomness level of the image was tested using the NPCR and UACI tests. Evaluation is used to determine the best algorithm and operating mode for encryption. Based on the measurement of image randomness on AES CBC, AES CFB, AES OFB, Camellia ECB, Camellia CBC, and Camellia OFB with NPCR values for encrypted images of 99.60%, 99.608%, 99.6093%, 99.6296%, 99.6072 %, and 99.6124%. Measurement of image randomness on AES CBC, AES CFB, AES OFB, Camellia ECB, Camellia CBC, and Camellia OFB with UACI values for encrypted images of 34.714%, 34.754%, 34.603%, 34.983%, 34.615%, and 34.707%.
References
M. Prabowo, “Aplikasi Pengiriman Data Citra Medis,†Universitas Islam Indonesia, 2018.
A. Rahman, “Tiga Penyebab Kebocoran Data di Kasus SingHealth,†Jakarta, 2019.
A. R. Santoso, A. Riski, and A. Kamsyakawuni, “Implementasi Algoritma Reversed Vigenere Encryption pada Pengamanan Citra,†2018.
A. Arief, “Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging,†vol. 3, no. 1, pp. 46–54, 2016.
Y. Pratama, M. Mulya, and A. S. Utami, “Steganografi Citra RGB dengan Pengacakan Blok dan Praproses Enkripsi Menggunakan Algoritma Rijndael 128 Bit,†pp. 143–149, 2017.
R. Rahmawati and D. Rahardjo, “Aplikasi Pengamanan Data Menggunakan Algoritma Steganografi Discrete Cosine Transform dan Kriptografi grafi AES 128 BIT pada SMK PGRI 15 Jakarta,†vol. 2, no. April, pp. 67–74, 2016.
D. Putra, “Penerapan Metode Camelian Untuk Keamanan Pesan Text Berbasis Chatting,†vol. 16, pp. 433–435, 2017.
P. Rambe and P. Tarigan, “Analisa Algoritma Horseshoe Map pada Proses Keamanan Citra,†J. Pelita Inform., vol. 17, no. April, pp. 210–212, 2018.
H. Kurniadi, W. Djuriatno, and A. Muttaqin, “Implementasi Algoritma Kriptografi Elgamal Untuk File Citra 2 Dimensi,†2015.
Y. Wu, S. Member, J. P. Noonan, and L. Member, “NPCR and UACI Randomness Tests for Image Encryption,†2011.
S. H. S. Herho, “Tutorial Pemrograman Python 2 Untuk Pemula,†WCPL Press. Bandung., no. November, 2017, doi: 10.31227/osf.io/bau26.
G. W. Bhaudhayana, “Implementasi Algoritma Kriptografi AES 256 dan Metode Steganografi LSB pada Gambar Bitmap,†vol. 8, no. 2, pp. 15–25, 2015.
G. F. Fitriana, “Pengenalan Tulisan Tangan Angka menggunakan Self Organizing Maps ( SOM ),†vol. 3, no. 1, pp. 31–42, 2021, doi: 10.47065/bits.v3i1.1002.
L. W. Santoso, G. S. Budhi, and L. Sutanto, “Perbandingan Aplikasi Menggunakan Metode Camellia 128 Bit Key dan 256 Bit Key,†J. Inform., vol. 12, no. 2, pp. 113–119, 2014, doi: 10.9744/informatika.12.2.113-120.
A. Hidayat, K. A. Ashari, D. Setiana, and R. Rudi, “Perbandingan Penggunaan Memory Dan CPU Mneggunakan Kritograpi AES,†J. Tek. Inform., vol. 6, no. 2, 2018.
A. Suprianto, Y. Prayudi, and B. Sugiantoro, “File To Image Encryption ( FTIE ) Menggunakan Algoritma Randomized Text Dan Arnold Cat Map ( ACM ) Untuk Keamanan Transmisi Data Digital,†pp. 19–26, 2017.



